Gartner warns of four distinct types of Business Email Compromise (BEC) phishing attacks. The most sophisticated (and potentially most financially damaging) of these BEC threats, Types 3 and 4 BEC, spoof and infiltrate your trusted vendors and suppliers — before targeting you. These BECs also easily evade cloud suite defenses and legacy email security gateways.
Download this BEC infographic for details on:
BEC by the numbers, including the growing threat to Office 365 users
The attack techniques behind each of the BEC types
How supply chain-based phishing (Types 3 & 4 BEC) works
An email security checklist – ask your vendor if they’re using these six techniques to fight BEC